DEBIAN-CVE-2025-22873

Source
https://security-tracker.debian.org/tracker/CVE-2025-22873
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-22873.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2025-22873
Upstream
Published
2026-02-04T23:15:54.220Z
Modified
2026-02-06T11:21:38.865741Z
Severity
  • 3.8 (Low) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

It was possible to improperly access the parent directory of an os.Root by opening a filename ending in "../". For example, Root.Open("../") would open the parent directory of the Root. This escape only permits opening the parent directory itself, not ancestors of the parent or files contained within the parent.

References

Affected packages

Debian:13 / golang-1.24

Package

Name
golang-1.24
Purl
pkg:deb/debian/golang-1.24?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.24.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-22873.json"

Debian:14 / golang-1.24

Package

Name
golang-1.24
Purl
pkg:deb/debian/golang-1.24?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.24.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-22873.json"